Why would you configure root protection?

Why would you configure root protection?

Why would you configure root protection?

A.
You want to protect the root bridge from receiving BPDUs on unauthorized interfaces.

B.
You want to protect your network from unwanted topology changes from a rogue switch attempting to become the root bridge.

C.
You want to avoid a broadcast storm that originates on the root bridge.

D.
You want to prevent unwanted user authentication to the root bridge by defining an acceptable source-address list for authorized access.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


mr_tienvu

mr_tienvu

I have the same idea. B